Hani Alzaid
According to our database1,
Hani Alzaid
authored at least 19 papers
between 2008 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2018
Comput. Networks, 2018
Proceedings of the Australasian Computer Science Week Multiconference, 2018
2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 12th Annual Mediterranean Ad Hoc Networking Workshop, 2013
Proceedings of the 4th International Conference on Information, 2013
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013
2012
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks.
Secur. Commun. Networks, 2012
Int. J. Commun. Networks Distributed Syst., 2012
LNT: A logical neighbor tree secure group communication scheme for wireless sensor networks.
Ad Hoc Networks, 2012
Performance Evaluation of EC-ElGamal Encryption Algorithm for Wireless Sensor Networks.
Proceedings of the Wireless Mobile Communication and Healthcare, 2012
2011
LNT: a Logical Neighbor Tree for Secure Group Management in Wireless Sensor Networks.
Proceedings of the 2nd International Conference on Ambient Systems, 2011
2010
Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2009
J. Digit. Content Technol. its Appl., 2009
A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA.
Proceedings of the Sensor Systems and Software, 2009
2008
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008
MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches.
Proceedings of the NTMS 2008, 2008
Proceedings of the Sixth Australasian Information Security Conference, 2008